49
49
Feb 27, 2016
02/16
by
CSPAN
tv
eye 49
favorite 0
quote 0
here's worth technology it's fine to say we should have this debate. the reality is that there is vastly more information available now than 20 years ago. >> vastly more. we are committed kidding in text, all of this information is out there much that is acceptable. in the cloud and other devices. we said we need information to build the criminal case, location information is available routinely. the reality is that we have a ton of information. but we are saying is in a narrow case, another security interests are at stake, we may not have universal access to all information because we are potentially harming the security of everyone who holds a phone. >> chris, do you have a problem with mr. farook's cloud information? >> i think there is a very interesting legal standard. that there is right now the legal standard for accessing information in the cloud. >> they would update that. by civilng held up agencies and law enforcement history's. we have a question but with the right standard is. >> i'm glad that you brought up that law because as it is, the
here's worth technology it's fine to say we should have this debate. the reality is that there is vastly more information available now than 20 years ago. >> vastly more. we are committed kidding in text, all of this information is out there much that is acceptable. in the cloud and other devices. we said we need information to build the criminal case, location information is available routinely. the reality is that we have a ton of information. but we are saying is in a narrow case,...
134
134
Feb 13, 2010
02/10
by
CSPAN
tv
eye 134
favorite 0
quote 0
work for about two years and fined that technology overtakes it. if it takes a broader view, if it recognizes what we are really talking about is moving information in some cases from your business or your desk to the clout and things about it in that way, if it focuses on processes like providing consumers with clearer information, i think it is possible to write a law that will do a lot of good and avoid the pitfalls one would confront if one tries to do too much. >> remember the story of the sidekick mobile phone? the computer would lose information. >> it was a device we have responsibility for. it was the other companies' technology, but a problem that we had to solve. >> what is going on as far as making sure those things do not happen? >> there is a whole set of precautions that need to be built into the technology. you need to have strong protection for security so that other people are not able to hack their way in like the incident that google recently confronted. you need reliability so that your own systems are operating in a strong way
work for about two years and fined that technology overtakes it. if it takes a broader view, if it recognizes what we are really talking about is moving information in some cases from your business or your desk to the clout and things about it in that way, if it focuses on processes like providing consumers with clearer information, i think it is possible to write a law that will do a lot of good and avoid the pitfalls one would confront if one tries to do too much. >> remember the story...
65
65
Nov 25, 2016
11/16
by
CSPAN
tv
eye 65
favorite 0
quote 1
veal qlik technologies contains revolve, the fbi and automotive industry must engage on cybersecurity. -- vehicle technologies continue to evolve, that's not in automotive industry must engage on cybersecurity. develop a relationship with your local fbi office before something happens rather than after something bad happens. fbi will do everything we can to share the relative information we can share with you. we frequent push out what we call flash report to share tactics and malware signatures. we will provide direct briefings on request or otherwise to have companies learn from previous event youd in the provide with information, we will provide you with feedback on what you have given us. the bottom line is we need your help to allow us to better address these threats. we know the private sector owns almost all of the infrastructure, the primary target and all of the information and evidence we would need to move forward resides on your networks and servers. unfortunately, more often than not, law enforcement is not notified when a niche region occurs. the estimates are about 20%
veal qlik technologies contains revolve, the fbi and automotive industry must engage on cybersecurity. -- vehicle technologies continue to evolve, that's not in automotive industry must engage on cybersecurity. develop a relationship with your local fbi office before something happens rather than after something bad happens. fbi will do everything we can to share the relative information we can share with you. we frequent push out what we call flash report to share tactics and malware...
80
80
Aug 18, 2011
08/11
by
CSPAN
tv
eye 80
favorite 0
quote 0
i see security as a human- enabled and technology-enabled. ait gives us the best opportunity to do technology with non-metallic devices. we have to be careful and recognize there are no guarantees and anybody even in a trusted status could be somebody who could do something bad. i have worked with fbi agents who turned out to be russian spies. there was an officer and a doctor that does bad things. the key is that we have technology that we can use to enhance the screening experience for security purposes for those we don't know. the total roll out a ait does not cover all 2200 checkpoints at the 450 airports around the country. it is to be deployed in a risk- based scenario looking at were the highest risk may be. >> one commented to add-on -- i would say that it is absolutely the administrators call on this one but my comment would be that we need to continue a r &d process to make sure we have cutting edge technologies available. at the same time, i would encourage our government to work with other governments around the world. aviation se
i see security as a human- enabled and technology-enabled. ait gives us the best opportunity to do technology with non-metallic devices. we have to be careful and recognize there are no guarantees and anybody even in a trusted status could be somebody who could do something bad. i have worked with fbi agents who turned out to be russian spies. there was an officer and a doctor that does bad things. the key is that we have technology that we can use to enhance the screening experience for...
6
6.0
Oct 22, 2020
10/20
by
CSPAN
tv
eye 6
favorite 0
quote 0
the technology is here. it is being slowly piloted and tested. in the real world, the risk is adequate. we need to use it. we need to have the voters vote. the question of near universal notement, i think that is true. people who areof security practitioners for large amounts of time who have been working on different aspects of our industries, and the technology to make this safe is here. it is being used in different aspects. we are just bringing it here, and it is being tested in a thoughtful, graduated manner. i don't think we should believe it's never going to be possible. narrativethe media and the element of public trust, i think -- i would put this on kevin since he represents the media here -- a lot of times the media doesn't have the nuance of reporting these things in a manner which gives people a balanced opinion. detectederability is in a system, it doesn't mean that your vote is going to be compromised. document was put out this week on how such theoretical vulnerabilities exist in the traditional system. i think folks in the media
the technology is here. it is being slowly piloted and tested. in the real world, the risk is adequate. we need to use it. we need to have the voters vote. the question of near universal notement, i think that is true. people who areof security practitioners for large amounts of time who have been working on different aspects of our industries, and the technology to make this safe is here. it is being used in different aspects. we are just bringing it here, and it is being tested in a...
52
52
Oct 10, 2019
10/19
by
CSPAN
tv
eye 52
favorite 0
quote 0
we know of the concerns of technological companies and protecting their users' data. with the context we provide today about how data security fits in with the other flesh and blood safety needs of our communities, will be better able to forge ahead. my view, this summit could not come at a better time. lawful access is not just a future problem, it is here now. we in government, law enforcement, victims advocacy, and the tech industry have the power and ability and skills to find a mutually acceptable solution. we have put some of the brightest minds of the country on this issue and we have learned it can responsibly be done. we are not prescribing a particular technical solution. every company is different, and the companies themselves are in the best position to develop lawful access solutions. we all want safe, secure, private data, but we also want safe and secure communities. we can have both. i really do believe that. i hope you have a great conference. i look forward to hearing ideas that come out of today's discussions. thanks. [applause] >> c-span's "washing
we know of the concerns of technological companies and protecting their users' data. with the context we provide today about how data security fits in with the other flesh and blood safety needs of our communities, will be better able to forge ahead. my view, this summit could not come at a better time. lawful access is not just a future problem, it is here now. we in government, law enforcement, victims advocacy, and the tech industry have the power and ability and skills to find a mutually...
25
25
Dec 3, 2016
12/16
by
CSPAN
tv
eye 25
favorite 0
quote 0
is difficult to keep up with technology. we have different areas of the constitutional law, statutory law. shiftsand of the day the , the changes, the different has we communicate, it begun to infuse lawyers in the legal system and judges in disruptive and profound ways. ist: is because technology changing so quickly or is it because law is not changing? paul: it is a little bit of both. ancient set of disciplines but at the same time law has also managed to keep up with seismic or tectonic shifts in all sorts of things in society. and technology is the latest challenge. there is always going to be a give and take when it comes to rapidly changing things like the law. think it willnd i all work out in the end. host: what is an example today we are facing? paul: fourth amendment. we think about the centuries old guarantee that unreasonable searches and seizures shall not occur without a warrant, let's say. how doquestion is something like that apply to cell phones, to email accounts, and it is a great measure of how fast thin
is difficult to keep up with technology. we have different areas of the constitutional law, statutory law. shiftsand of the day the , the changes, the different has we communicate, it begun to infuse lawyers in the legal system and judges in disruptive and profound ways. ist: is because technology changing so quickly or is it because law is not changing? paul: it is a little bit of both. ancient set of disciplines but at the same time law has also managed to keep up with seismic or tectonic...
28
28
Mar 7, 2020
03/20
by
CSPAN
tv
eye 28
favorite 0
quote 0
will show you some of the interviews we conducted with members of congress, government officials and technology users. joining us on the communicators some of theat were issues you dealt with back in the 1990's when you were the fcc commissioner? age of thehe golden federal communications commission. all of the lanes of the communication highly. it was from analog to digital. that was
will show you some of the interviews we conducted with members of congress, government officials and technology users. joining us on the communicators some of theat were issues you dealt with back in the 1990's when you were the fcc commissioner? age of thehe golden federal communications commission. all of the lanes of the communication highly. it was from analog to digital. that was
56
56
Mar 16, 2017
03/17
by
CSPAN
tv
eye 56
favorite 0
quote 0
s networks technology systems. this indictment details how russian federal securities officers working together with criminal hackers conspired to plan and carry out one of the largest cyber intrusions in u.s. history. these perpetrators compromised the company's networks, along with the accounts and personal information of approximately 500 million yahoo! users, and further still millions of user contacts to carry out fraud schemes for their own personal financial gain and enrichment, among other things. i want to note, this is a highly complex, long-term investigation that has only reached this stage as a result of the relentless and persistent and dedicated efforts of the team. it also further underscores the central value of early, proactive engagement and cooperation between the private sector and the government. our ability to identify, detect and hold cyber criminals accountable under the law, while preventing and mitigating harm, is contingent upon our ability to work closely and cooperatively with companie
s networks technology systems. this indictment details how russian federal securities officers working together with criminal hackers conspired to plan and carry out one of the largest cyber intrusions in u.s. history. these perpetrators compromised the company's networks, along with the accounts and personal information of approximately 500 million yahoo! users, and further still millions of user contacts to carry out fraud schemes for their own personal financial gain and enrichment, among...
45
45
Dec 20, 2015
12/15
by
CSPAN
tv
eye 45
favorite 0
quote 0
working on very specific cutting edge technologies i am interested in. but you don't understand because you're not used to dealing with us, you find is overwhelming. it is one of the reasons why the department has created the innovation organization in the valley. it is one of the reasons we created intelligence communities. is of the reasons why nsa's trying to bridge that gap. >> what is the role of nsa in the context of doe? and cyber defense of the u.s. power grid infrastructure. how do you see the consortium of national agencies as it relates to the protection of people. designated ase the defense and oversight of the domain. theas been designated as primary for the applications of government capability and support of the private sector. test over toll the .e law enforcement element from a law enforcement perspective on private sector. nsa is not the lead on any of this. we are all about partnerships. i am always partnering with fbi dhs and others as how to we play capability -- the example of sony, how do we work together in this case with how will
working on very specific cutting edge technologies i am interested in. but you don't understand because you're not used to dealing with us, you find is overwhelming. it is one of the reasons why the department has created the innovation organization in the valley. it is one of the reasons we created intelligence communities. is of the reasons why nsa's trying to bridge that gap. >> what is the role of nsa in the context of doe? and cyber defense of the u.s. power grid infrastructure. how...
147
147
Dec 1, 2012
12/12
by
CSPAN
tv
eye 147
favorite 0
quote 0
gregory nojeim is with the center of technology. he spent many years as the associate director legislative counsel of the washington office. next area of discussion? >> is there any risk of impeding litigation? the securitiesf and exchange commission, and they want to get information from you. they want to know something about whether the company is engaging in illegal business practices. does this impede the investigation? >> you could use google as an example. google acts both as a provider of communications and is a provider of communication to its employees. what i think the world ought to look like is that if they are investigating google and they want to get the corporate records, it they should be able to serve a subpoena and get the records. that is what the legislation is intended to do. if they are doing an investigation of somebody else to has age e-mail account and your e-mail is not a global corporate record, and that is where the rub is. the ftc and sec want to be able to go to the providers with subpoenas to get this
gregory nojeim is with the center of technology. he spent many years as the associate director legislative counsel of the washington office. next area of discussion? >> is there any risk of impeding litigation? the securitiesf and exchange commission, and they want to get information from you. they want to know something about whether the company is engaging in illegal business practices. does this impede the investigation? >> you could use google as an example. google acts both as...
36
36
Sep 10, 2017
09/17
by
CSPAN
tv
eye 36
favorite 0
quote 0
recruiting on technology and the internet. governments are going to be very careful because of what they block, the free speech model. after charleston, i heard company say, we're going to keep those neo-nazis off the internet. i thought, terrific. what about saying, we are going to keep the terrorists off the internet next? >> if tom doesn't know the answer, i don't either. [laughter] >> i think we have time for one last question. front. in >> i work for the school for ethics of global leadership in the district of columbia. i were with students who might be in all of this -- i work with students who might be asking what role do they have in all of this? >> given the kind of world we live in right now, the citizen is the most important person. be the fbi org to the cia was going to detect the next terrorist. it really isn't. it is going to be a local police officer. policeman per square inch run times square than any other place in the world. it, street vendor disrupted solved the problem, and called the police. thing is ther
recruiting on technology and the internet. governments are going to be very careful because of what they block, the free speech model. after charleston, i heard company say, we're going to keep those neo-nazis off the internet. i thought, terrific. what about saying, we are going to keep the terrorists off the internet next? >> if tom doesn't know the answer, i don't either. [laughter] >> i think we have time for one last question. front. in >> i work for the school for ethics...
46
46
Nov 24, 2017
11/17
by
CSPAN
tv
eye 46
favorite 0
quote 0
some of the challenges are technology-based. a big one is power consumption. as we think about billions of devices out there, a good number of them are not going to be plugged into the grid all the time. [captioning performed by the national captioning institute, which is responsible for its caption content and accuracy. visit ncicap.org] >> they're going to need battery power of some sort or the ability to generate their own power. there is some trade-off with their ability to communicate and their energy consumption that will drive certain considerations in terms of the architecture going forward. there is potential trade-offs with how you program these devices. they will be out in the wild for five or 10 years. have you can some updated -- how do you keep them updated? there are some challenges in the market. not all devices can talk to each other. you have some ecosystems that you need to pick as a consumer before you really take advantage of some of these technological advances. there are issues of consumer trust in devices. there are other challenges out
some of the challenges are technology-based. a big one is power consumption. as we think about billions of devices out there, a good number of them are not going to be plugged into the grid all the time. [captioning performed by the national captioning institute, which is responsible for its caption content and accuracy. visit ncicap.org] >> they're going to need battery power of some sort or the ability to generate their own power. there is some trade-off with their ability to...
23
23
Aug 4, 2017
08/17
by
CSPAN
tv
eye 23
favorite 0
quote 0
energy and natural resources committee yesterday held a hearing on how technology can be used to reduce forest fires. witnesses from the agricultural department, interior department, and state officials from washington, alaska, and main testified. lisa murkowski is chair of the committee. >> good morning. the committee will come to order. we are here today to take a look at wildfires, to examine our wildfire management program, the collaboration that is what iron to reduce risk to firefighters, communities, and resources and some of the emerging technologies that are changing the way that fires are managed.
energy and natural resources committee yesterday held a hearing on how technology can be used to reduce forest fires. witnesses from the agricultural department, interior department, and state officials from washington, alaska, and main testified. lisa murkowski is chair of the committee. >> good morning. the committee will come to order. we are here today to take a look at wildfires, to examine our wildfire management program, the collaboration that is what iron to reduce risk to...
57
57
Dec 15, 2016
12/16
by
CSPAN
tv
eye 57
favorite 0
quote 0
the rule change was brought about by the advance of technology. this role was promulgated back in 1917. it is on 100 years old. richard: this is the role of government searches of homes when there is probable cause and all the bells and whistles that go along with our constitutional protection. the problem was that in 1917, the rule makers thought rightfully at the time that the investigators would know what court to go to in the rule was -- and the rule was if you want to search of property in a particular district, you go to the court in that district. the difficulty that has arisen is twofold, and they are both problems that were created as technology has advanced. the first one is that we have near perfect anonymity systems that are now built that prevent law enforcement from being able to identify what the location of the computer is. on a network such as the tor network which creates an anonymization mechanism. so if someone wants to communicate with others, he can do so through the network and fairly effectively prevent law enforcement from
the rule change was brought about by the advance of technology. this role was promulgated back in 1917. it is on 100 years old. richard: this is the role of government searches of homes when there is probable cause and all the bells and whistles that go along with our constitutional protection. the problem was that in 1917, the rule makers thought rightfully at the time that the investigators would know what court to go to in the rule was -- and the rule was if you want to search of property in...
28
28
Oct 4, 2017
10/17
by
CSPAN
tv
eye 28
favorite 0
quote 0
we have the human error, we did the scan, the technology never found it. in july, we sauces vicious activity, to the portal down, found the vulnerability, applied the patch. >> well, i think the chairman. we have in the roles of full committee which are approved at the beginning of every congress that members of the full committee can participate in subcommittees when they are not members. i appreciate the legislative courtesy and i think there is a lot more to be done on this issue, mr. chairman. if i might make the recommendation, think we should up the cio, the chief information officer, come in because i do not think that this is resolved. thank you. >> thank you very much. ask the gentlelady's time has expired. we're going to ask one quick a lot. i yield to the ranking member first. >> worst of all, mr. chairman, i would like to insert for the record a letter from consumers group credit union national association and an article from wgn tv. >> without objection, so ordered. .> all right so in closing, mr. smith, i want to quote again from you, from yo
we have the human error, we did the scan, the technology never found it. in july, we sauces vicious activity, to the portal down, found the vulnerability, applied the patch. >> well, i think the chairman. we have in the roles of full committee which are approved at the beginning of every congress that members of the full committee can participate in subcommittees when they are not members. i appreciate the legislative courtesy and i think there is a lot more to be done on this issue, mr....
0
0.0
Jul 5, 2023
07/23
by
CSPAN
tv
eye 0
favorite 0
quote 0
technology, x-ray technology must be in an open architecture framework. in other words, that we could take the data out of an x-ray system that lets say we were using in one airport in the country and transmitted in real-time to us here in washington we wanted to see it or transmitted between tsa and customs and border protection. the other reason for open architecture is we want to be much more agile in our reporting to bring software solutions to our technology. sometimes we see a change in a threat that we know that our x-ray systems can detect. we just have to modify the algorithms that are in those systems to be able to provide that detention. right now, that is a longer process because you have to rewrite essentially the entire software package in that x-ray machine. open architecture will mean that we can just add a layer onto the existing software appeared we can compete that software develop meant amongst a series of secure vendors and give them 90 or 120 days to come up with a software solution. rather than doing a manual workaround to a threat
technology, x-ray technology must be in an open architecture framework. in other words, that we could take the data out of an x-ray system that lets say we were using in one airport in the country and transmitted in real-time to us here in washington we wanted to see it or transmitted between tsa and customs and border protection. the other reason for open architecture is we want to be much more agile in our reporting to bring software solutions to our technology. sometimes we see a change in a...
31
31
Aug 28, 2019
08/19
by
CSPAN
tv
eye 31
favorite 0
quote 0
let's say the technology works, access denied. but is that technology flagging you? something is going op here, this person should not be trying to gain access to something. -- to this piece of critical infrastructure. why? things are crystal clear in the rearview mirror. but do we have the technology in place to understand the puzzle pieces around us so we can put a complete picture together? and lastly on this particular topic, that pathway to violence. do we have a program in place that identifies, highlights, and provides the help needed for people that are becoming radicalized, that are becoming violent? and are your cyber folks talking to your physical folks? maybe on the physical side we've had a domestic violence episode. we had somebody say something very violent to a co-worker. is that information getting back to the cyber folks that can see the fact that they are looking at radicalized material? that they're looking at hate groups online. can we put all of these puzzle pieces together to identify an insider? finally on drones, it's hard to recall life befo
let's say the technology works, access denied. but is that technology flagging you? something is going op here, this person should not be trying to gain access to something. -- to this piece of critical infrastructure. why? things are crystal clear in the rearview mirror. but do we have the technology in place to understand the puzzle pieces around us so we can put a complete picture together? and lastly on this particular topic, that pathway to violence. do we have a program in place that...
33
33
Dec 19, 2015
12/15
by
CSPAN
tv
eye 33
favorite 0
quote 0
then we can take advantage of technology. corey: some of this space to the government's ability to conduct digital surveillance. we just finished a big debate about a phone metadata collection program. we are or been at the battle about internet surfing. section 702. there has not been enough -- as much of a push to totally eliminate that program. what you think is going to happen with that or do we need it? schwartz: there's a difference in the way that those two programs have been seen. the privacy and civil liberties oversight board which was givesd by congress that public comments on this type of activity. they said that 702 there were some tweaks to it that could be made. it allows law enforcement and intelligence in more information from folks working with companies directly to get it. communication information. under certain court supervision. the issue i think has been -- the president called for review .fter the nsa disclosures can board had a lot less concerned with 702. those two different groups making this kind o
then we can take advantage of technology. corey: some of this space to the government's ability to conduct digital surveillance. we just finished a big debate about a phone metadata collection program. we are or been at the battle about internet surfing. section 702. there has not been enough -- as much of a push to totally eliminate that program. what you think is going to happen with that or do we need it? schwartz: there's a difference in the way that those two programs have been seen. the...
27
27
Aug 26, 2017
08/17
by
CSPAN
tv
eye 27
favorite 0
quote 0
he technology is also potentially your spy. it's not the fbi. but maybe you're in a bad lawsuit or divorce or your wife the sband subpoenas documents for discovery to prove you're cheating or something. not what the technology was there for, but that's what it's going to be used for. gotten these smart smoke detectors and thermostats. last time you updated your cell phone or bought a new cell phone? guessing the last two years. when was the last time you your smoke detector? probably never. hese devices will be in our house probably five or ten years. updated. be they'll be secure and connected to the internet. what we're seeing is the tidal wave of insecure pervasive technologies the cost of times, hanging out a smoke detector per company is greater than the cost of the smoke detector, the these devices in and deploying and tracking them. that's where they're going. we are now, we have a lot of risks we're not understanding. we don't accept the risks because we don't understand them. car with telemetry. go to ford, what information are advertis
he technology is also potentially your spy. it's not the fbi. but maybe you're in a bad lawsuit or divorce or your wife the sband subpoenas documents for discovery to prove you're cheating or something. not what the technology was there for, but that's what it's going to be used for. gotten these smart smoke detectors and thermostats. last time you updated your cell phone or bought a new cell phone? guessing the last two years. when was the last time you your smoke detector? probably never....
41
41
Dec 15, 2016
12/16
by
CSPAN
tv
eye 41
favorite 0
quote 0
>> the rule change was brought about by the advance of technology. this role was promulgated back 1917.70 teen -- of governmentle searches of homes when there is probable cause and all the best -- bells and whistles that go along with our constitutional protection. in 1917, the rule makers thought rightfully at the time that the investigators would know what court to go to in the rule was if you want to search of property in a particular district, you go to the court in that district. the difficulty that has arisen is twofold and they are both problems that were created as technology has advanced. the first one is that we have near perfect anonymity systems that are now built that prevent law enforcement from being able to identify what the location of the computer is. the torwork such as network which creates an anonymous nation -- ano nymization. prevent law enforcement from knowing where his home is in order to get a warrant for it. andone primary mechanism this will change, all the rule changes say in those circumstances where the location duehe
>> the rule change was brought about by the advance of technology. this role was promulgated back 1917.70 teen -- of governmentle searches of homes when there is probable cause and all the best -- bells and whistles that go along with our constitutional protection. in 1917, the rule makers thought rightfully at the time that the investigators would know what court to go to in the rule was if you want to search of property in a particular district, you go to the court in that district. the...
14
14
Aug 11, 2018
08/18
by
CSPAN
tv
eye 14
favorite 0
quote 0
far can we get toward context using technology? you need people in that process, but how far can we get to break that data down and get useful context? >> the technology becomes more relevant the larger your population. only have 12 people in the company, i think one or two of you can sit down with a pen and paper and figure out your issues. if you have 80,000 people in a worldwide organization, that is a totally different issue. it doesn't matter how many analysts you have. that is not going to work, so the technology becomes more important. technology is not going to find your answer, identify what is an ident -- insider threat. what it will identify -- this is not about the person's name. describedow kim , you are notin's looking at the people, but the activity and that is critical with technology. you want to look for what is abnormal in the activities and behaviors of individuals on your networks. and you get to the behavioral side, then the technology isn't as important on the detection piece, it becomes more important in the
far can we get toward context using technology? you need people in that process, but how far can we get to break that data down and get useful context? >> the technology becomes more relevant the larger your population. only have 12 people in the company, i think one or two of you can sit down with a pen and paper and figure out your issues. if you have 80,000 people in a worldwide organization, that is a totally different issue. it doesn't matter how many analysts you have. that is not...
17
17
Nov 27, 2017
11/17
by
CSPAN
tv
eye 17
favorite 0
quote 0
some of the challenges our technology-based. the big one is power and power consumption. we think about billions of devices out there, a good number of them are not going to be plugged into the grid all the time. they will need battery power of some sort, or the ability to generate their own power. there is some trade-off with their ability to communicate and her energy consumption. that will drive certain considerations in terms of the architecture of iot going forward. potential trade-offs of how you program these devices. they will be out in the wild for 5-10 years. have you keep them updated? there are challenges in the market. interoperability is one of the things we see right now. not all devices can talk to each other. proprietary ecosystems you need to take as a consumer before you can take advantage of some of these technological advances. there are issues of trust, consumer trust. there are other challenges. i put two out the most relevant for this room because i think of them as horizontal challenges that are enablers of not of iot and that is spectrum insecuri
some of the challenges our technology-based. the big one is power and power consumption. we think about billions of devices out there, a good number of them are not going to be plugged into the grid all the time. they will need battery power of some sort, or the ability to generate their own power. there is some trade-off with their ability to communicate and her energy consumption. that will drive certain considerations in terms of the architecture of iot going forward. potential trade-offs of...
1
1.0
Jun 19, 2021
06/21
by
CSPAN
tv
eye 1
favorite 0
quote 0
developments in technology exacerbate the overall threat. today, people may be drawn to social media and then to encrypted communications channels. there, they may interact with like-minded people across the country, and indeed the world, who want to commit violent attacks. and they may then connect with others who are formulating attack plans, as well as mustering the resources -- including firearms and explosives -- to execute them. technology has amplified and enabled transnational elements of the threat. in earlier days, foreign terrorist groups had to board airplanes to conduct attacks in america. now, they take advantage of technology to inspire others already located in the u.s. to violence. the same is true for domestic violent extremists, who increasingly take common cause and inspiration from events and actions around the world, indicating an important international dimension to this problem. the man who allegedly killed one person and injured three in an april 2019 attack on a synagogue in poway, california, cited as inspiration a
developments in technology exacerbate the overall threat. today, people may be drawn to social media and then to encrypted communications channels. there, they may interact with like-minded people across the country, and indeed the world, who want to commit violent attacks. and they may then connect with others who are formulating attack plans, as well as mustering the resources -- including firearms and explosives -- to execute them. technology has amplified and enabled transnational elements...
65
65
Aug 6, 2011
08/11
by
CSPAN
tv
eye 65
favorite 0
quote 0
this is brand new technology that we have been pushing out the boundaries. asking them to do it, they have an inherent need to do that, to make their business successful. people talk all the time about power stations. they do not make money at the lights are not on. businesses do not make money if the products that cannot be sold sterling. there is an imperative for them to do it as well. there are those that are slow to recognize their role. part of our job is to make sure they have a shared responsibility. guest: at what point does that exceed their responsibility? the pentagon is concerned that they are relying on the same power grid as all of us. the lights go up, it affects us just as much. when does a cyber attack, and act of war, use of force, something where it starts to go into the military? guest: the dead is one of the things we continue to debate with smart lawyers -- that is one of the things we continue to debate with smart lawyers. hopefully, we will never see that. there has been a lot of discussion about putting labels associated with cyber
this is brand new technology that we have been pushing out the boundaries. asking them to do it, they have an inherent need to do that, to make their business successful. people talk all the time about power stations. they do not make money at the lights are not on. businesses do not make money if the products that cannot be sold sterling. there is an imperative for them to do it as well. there are those that are slow to recognize their role. part of our job is to make sure they have a shared...
0
0.0
Apr 6, 2023
04/23
by
CSPAN
tv
eye 0
favorite 0
quote 0
i ran a nonprofit, i ran a small technology company and then i ran a public technology company before coming back to public service. where i skip into the office in the morning because it feels so good. the palpable sense of being a part of something that is bigger than you and important. i felt it as a junior officer in the military and is good to recapture now. the comment i would make is that in this area in particular, if you agree with the proposition that i started with the technology innovation is likely to be the foundational source of national power in the foreseeable future. we need technology business people who are public and people in government with commercial sensibility because the two things have to work together. i am a proponent of careers that work along that seam. it can give you binocular vision rather than looking through the soda straw you can see both. my advice is, maybe try to weave back and forth. if you are building a private sector technology career. please consider giving some of your time to public service. we need you and it really is fulfilling. >> i
i ran a nonprofit, i ran a small technology company and then i ran a public technology company before coming back to public service. where i skip into the office in the morning because it feels so good. the palpable sense of being a part of something that is bigger than you and important. i felt it as a junior officer in the military and is good to recapture now. the comment i would make is that in this area in particular, if you agree with the proposition that i started with the technology...
64
64
Jul 29, 2017
07/17
by
CSPAN
tv
eye 64
favorite 0
quote 0
with technology, your mouse does not vibrate. you don't know when you are doing anything risky online, and you don't know where the limits are. you blow through them all not realizing. when you do something risky online and it writes you in the it's impossible to tell what the bad behavior was. maybe your credit score is now down. maybe your credit card has been stolen. was that something from last month, what was the bad behavior that harmed me? you can't figure it out. you can never create this loop, unlike when you are driving fast and you realize i'm going to fast. there's no feedback loop like that online. host: how do you personally protect yourself and your own devices? jeff: i'm a big believer in simplification. i don't have apps installed. host: do you use uber? because of the tracking? jeff: why do they need to track me when they are not calling for a car. apple has been making good progress about not allowing apps to geo-locate you we were not running the app. maybe once they put in these protections i will use more ap
with technology, your mouse does not vibrate. you don't know when you are doing anything risky online, and you don't know where the limits are. you blow through them all not realizing. when you do something risky online and it writes you in the it's impossible to tell what the bad behavior was. maybe your credit score is now down. maybe your credit card has been stolen. was that something from last month, what was the bad behavior that harmed me? you can't figure it out. you can never create...
74
74
Nov 16, 2013
11/13
by
CSPAN
tv
eye 74
favorite 0
quote 0
i work in another area of technology, genetic technology, and police just did not start a giant forensic dna databank of byrybody in the universe following them around and see where they spit and doing dna coding. we had a social discussion about whose dna should be collected and we determined it was people who had committed crimes and were more likely to commit other crimes, so that we could solve subsequent crimes. we did not put everybody in there, but everybody's going into a database about additional database. i think we see -- we need the same sort of societal discussion and protections we had in that era. class we had been talking with lori andrews, a professor of law at the college of law at the illinois institute of technology . she is also the author of this book. "i know who you are and i saw what you did. you are watching "the communicators" on c-span. >> c-span, created by amerco's cable companies in 1979, brought to you as a public service by your television provider. >> there are some serious scholars in women's studies. their fairents have share of ideological non- academ
i work in another area of technology, genetic technology, and police just did not start a giant forensic dna databank of byrybody in the universe following them around and see where they spit and doing dna coding. we had a social discussion about whose dna should be collected and we determined it was people who had committed crimes and were more likely to commit other crimes, so that we could solve subsequent crimes. we did not put everybody in there, but everybody's going into a database about...
0
0.0
Nov 2, 2022
11/22
by
CSPAN
tv
eye 0
favorite 0
quote 0
so very excited about what i'm seeing from the technology companies. i post a lot about transparency and things like statistics around implementation. so, a lot of exciting things going on but it all starts with this fabulous strategic plan which along with our entire team. all of which we are going to do to measure our ability to get those done which will ultimately reduce risk to america's critical infrastructure. >> i talked a lot with corporate ceos, i was the undersecretary of dhs, now i see it from the other side serving on boards, but it is really interesting. your point about corporate cyber responsibility is specific with part of my big issue these days is reinvigorating civics education as a way of building resilience against disinformation, but also as a way of strengthening civic responsibility. before we can instill corporate responsibility, we need to remind americans about civic responsibility. that you owe something to your community, you are part of something bigger and therefore have this responsibility. i don't know if you've experie
so very excited about what i'm seeing from the technology companies. i post a lot about transparency and things like statistics around implementation. so, a lot of exciting things going on but it all starts with this fabulous strategic plan which along with our entire team. all of which we are going to do to measure our ability to get those done which will ultimately reduce risk to america's critical infrastructure. >> i talked a lot with corporate ceos, i was the undersecretary of dhs,...
391
391
Jan 29, 2019
01/19
by
CSPAN
tv
eye 391
favorite 0
quote 1
first, huawei technologies company, limited. the chief operating company of the huawei conglomerate. second, huawei device usa. the main u.s. subsidiary of huawei. third, sky com tech company, limited. a hong kong company operating in iran that was a de facto subsidiary of huawei. and 4th, wong jaomong, board member of huawei and former board member of sky com. as you're probably aware, huawei is the world's largest telecommunications company, headquartered in the people's republic of china. the defendants are various charged with conspiracy, bank fraud, wire fraud, violations of the international emergency economic powers act, money laundering and obstruction of justice. as with all defendants in the american criminal justice system, they are presumed not guilty. the indictment unsealed today is the result of a long-term investigation of huawei by the u.s. attorney's attorney's office in the eastern district of new york, the doj's criminal division, the doj's national security division and our law enforcement partners from the
first, huawei technologies company, limited. the chief operating company of the huawei conglomerate. second, huawei device usa. the main u.s. subsidiary of huawei. third, sky com tech company, limited. a hong kong company operating in iran that was a de facto subsidiary of huawei. and 4th, wong jaomong, board member of huawei and former board member of sky com. as you're probably aware, huawei is the world's largest telecommunications company, headquartered in the people's republic of china....
30
30
Nov 8, 2019
11/19
by
CSPAN
tv
eye 30
favorite 0
quote 0
one issue is understanding technology and we have the general counsel of the fbi here for you. one of the issues he was talking about is trying to figure out what happened with the pfizer that isd the fisc coming. what is your department saying about why that is an important tool in basing nsd, what tools are critical and what tools do you want? do you think you have enough tools to achieve your goals for the department? >> that is a question we constantly ask ourselves. first office i laid out. the thinking about that office was you can't have operational people responsible for policy because the policy never gets done because of the demands of the operation. you need to set aside an office of folks who can just pick about that. that is a constant question for us. , 215, a.s. freedom act business records provision of fisa, anything you can get with on the fisa and side you have to get a court order, on the grand jury side, you just have to get a prosecutor to sign a subpoena. authority so people are swapping out cell phones and evading surveillance and you can continue without
one issue is understanding technology and we have the general counsel of the fbi here for you. one of the issues he was talking about is trying to figure out what happened with the pfizer that isd the fisc coming. what is your department saying about why that is an important tool in basing nsd, what tools are critical and what tools do you want? do you think you have enough tools to achieve your goals for the department? >> that is a question we constantly ask ourselves. first office i...
58
58
Oct 7, 2017
10/17
by
CSPAN
tv
eye 58
favorite 0
quote 0
we are currently working really hard on catching up with the technology. it is just being released now. density and a lot of these other vehicle to vehicle infrastructure type of radios -- you know,ening stop lights, and roadsigns, is very new. it has not been tested in a security setting yet. at least not in the real world. cost of tools become less peoples, more and more can access these tools. as more and more people have to communicate with vehicle to vehicle infrastructure, radio connectivity, i think we are going to find a lot more problems with it. i think it is a good idea that ony try to keep their mind security as they roll these systems out. i am a little bit nervous but that is not happening yet. security is very difficult. it is difficult to have security -- it is difficult to maintain it and integrated a -- across a lot of different manufacturers. we are going to have growing pains. initially. i hope it does not cause a slowdown in the promise of vehicle to vehicle infrastructure technology. our car manufacturers working together to such regu
we are currently working really hard on catching up with the technology. it is just being released now. density and a lot of these other vehicle to vehicle infrastructure type of radios -- you know,ening stop lights, and roadsigns, is very new. it has not been tested in a security setting yet. at least not in the real world. cost of tools become less peoples, more and more can access these tools. as more and more people have to communicate with vehicle to vehicle infrastructure, radio...
24
24
Apr 9, 2017
04/17
by
CSPAN
tv
eye 24
favorite 0
quote 0
haveth oil, you technology. if you choose the premises you can actually say something that feels true and beautiful in the world of movies. announcer: tuesday, former u.s. attorney for new york at cooper new york city. and wednesday, former education secretary and wife of democratic senator tim kaine chairs her views about public education. think we have to remember that local ownership of schools has a lot to do with that positive support for the schools. >> thursday, a panel on the prescription addiction crisis posted by the university of southern california. they have created something and made a dragon tell you, you have this. do you ever not sleep at night? do you have anxiety, are you ever hungry? and that no my god, i better go get some testosterone. the nation's highest court. >> curious people go further. it is curiosity that lead you to experience new things that might lead you to find an interest you never imagined. announcer: now, a discussion on new technology designed to detect concussions and what
haveth oil, you technology. if you choose the premises you can actually say something that feels true and beautiful in the world of movies. announcer: tuesday, former u.s. attorney for new york at cooper new york city. and wednesday, former education secretary and wife of democratic senator tim kaine chairs her views about public education. think we have to remember that local ownership of schools has a lot to do with that positive support for the schools. >> thursday, a panel on the...
44
44
Oct 5, 2014
10/14
by
CSPAN
tv
eye 44
favorite 0
quote 0
>> that's the technology we talked about. so moving to chip cards, marchents have argued strenuously that those should be issued with pin numbers so you have authentication of the card. we feel strongly about that. but tokenization which we believe is an underpinning of apple pay is also a very terrific long-term solution that would instead of transmitting information related to the 16 digits on your card, you transmit something else that if intercepted couldn't be sold. but couldn't lead to fraud. >> i want to come to this point. i don't mean to represent the control sort of as the be all and end all. nothing solves a problem to 100%. but because you are going to get a cold at some point in your lifetime did you that mean your atgoing to wash your hands? because you're not going to be in a traffic accident does that mean you don't buckle your seat belt? this is something we're not doing approaching in a systematic way but we're all on the same page. >> what are they supposed to do to protect their identity and card numbers,
>> that's the technology we talked about. so moving to chip cards, marchents have argued strenuously that those should be issued with pin numbers so you have authentication of the card. we feel strongly about that. but tokenization which we believe is an underpinning of apple pay is also a very terrific long-term solution that would instead of transmitting information related to the 16 digits on your card, you transmit something else that if intercepted couldn't be sold. but couldn't lead...
43
43
Oct 6, 2017
10/17
by
CSPAN
tv
eye 43
favorite 0
quote 1
the technological error involved a scanner that failed to detect vulnerability on this portal. both errors have since been addressed. i'm july 20 ninth and 30th, suspicious activity was detected. responseed our protocol at the time. the team shut down the portal and began their internal security investigation. on august 2, we hired top cyber security forensic and legal experts. we also notified the fbi. at that time we did not know the nature of the scope of the incident. it was not until late august that we concluded we had experienced a major data breach. tor the weeks leading up september 7, our team continued working around-the-clock preparing to make things right. we took four steps to protect consumers. we determined when and how to alert the public and we relied on the advice of our experts that we needed to have a plan in place. number two, developing a website to offering free services those impacted and to all americans. three, preparing for increased cyber attacks which were advised or common after a company announces a breach. number four, continuing to coordinate w
the technological error involved a scanner that failed to detect vulnerability on this portal. both errors have since been addressed. i'm july 20 ninth and 30th, suspicious activity was detected. responseed our protocol at the time. the team shut down the portal and began their internal security investigation. on august 2, we hired top cyber security forensic and legal experts. we also notified the fbi. at that time we did not know the nature of the scope of the incident. it was not until late...
0
0.0
Nov 19, 2023
11/23
by
CSPAN
tv
eye 0
favorite 0
quote 0
technology, help make decisions about how that money is spent. so when i arrived, the team that was running the tmf was pretty small and it didn't involve and include a lot of seasoned technologist. we have built up that team, brought people in for the private sector to help run the operation and it is completely transformed the amount of projects that have gone through are much, much higher speed. there have been 47 projects that have gone through with $770 million at a pass-through and have been committed. so i'm really proud of the work that team has done. >> sounds like when we got off the ground there was a little delay because of the small number of people that were administering that. do you have any examples of projects, areas in which that funding has been -- >> i do. while it's not sort of formally divided up into buckets, that is mainly focus on cybersecurity and a thing called zero trust has been one of the primary areas of focus and that of course is something that all agencies need. also, shared services, and what i mean by that if
technology, help make decisions about how that money is spent. so when i arrived, the team that was running the tmf was pretty small and it didn't involve and include a lot of seasoned technologist. we have built up that team, brought people in for the private sector to help run the operation and it is completely transformed the amount of projects that have gone through are much, much higher speed. there have been 47 projects that have gone through with $770 million at a pass-through and have...
0
0.0
Apr 6, 2023
04/23
by
CSPAN
tv
eye 0
favorite 0
quote 0
moving away from that triad, it is a technology piece, but thinking about the layers, technology layers that is one. but i really do -- need people to understand what a risk is. that is looking at the cyber security risk. it is a mitigating risk, but that is what it is. owner ability. you find vulnerability. consequences. the work that through. that is the second piece. the third piece is really focused on how we construct strategy, and that is cybersecurity is important everything else. with cybersecurity enabled, everything we want is an already demanding issue. that is not your focus, but its tech innovation and economic development it is at the core of the community helping it thrive. >> all give you five pieces from the seed of diplomats. first, articulation with positive and compelling visions. this can't just be anti-china or russia. we need a more persuasive posture for the middleground states to join us. second, we have to build back. bilaterally and multilaterally, we want long-term term, to have the greatest number of people with the greatest gdp, the greatest number of compa
moving away from that triad, it is a technology piece, but thinking about the layers, technology layers that is one. but i really do -- need people to understand what a risk is. that is looking at the cyber security risk. it is a mitigating risk, but that is what it is. owner ability. you find vulnerability. consequences. the work that through. that is the second piece. the third piece is really focused on how we construct strategy, and that is cybersecurity is important everything else. with...
54
54
Nov 26, 2017
11/17
by
CSPAN
tv
eye 54
favorite 0
quote 0
some of the challenges our technology-based. the big one is power and power consumption. we think about billions of devices out there, a good number of them are not going to be plugged into the grid all the time. they will need battery power of some sort, or the ability to generate their own power. there is some trade-off with their ability to communicate and her energy consumption. that will drive certain considerations in terms of the architecture of iot going forward. potential trade-offs of how you program these devices. they will be out in the wild for 5-10 years. have you keep them updated? there are challenges in the market. interoperability is one of the things we see right now. not all devices can talk to each other. proprietary ecosystems you need to take as a consumer before you can take advantage of some of these technological advances. there are issues of trust, consumer trust. there are other challenges. i put two out the most relevant for this room because i think of them as horizontal challenges that are enablers of not of iot and that is spectrum insecuri
some of the challenges our technology-based. the big one is power and power consumption. we think about billions of devices out there, a good number of them are not going to be plugged into the grid all the time. they will need battery power of some sort, or the ability to generate their own power. there is some trade-off with their ability to communicate and her energy consumption. that will drive certain considerations in terms of the architecture of iot going forward. potential trade-offs of...
0
0.0
Jan 28, 2024
01/24
by
CSPAN
tv
eye 0
favorite 0
quote 0
so use technology in a way that it saves times and proves that but demonstrates to the skeptic the technology did not cheat. unfortunately in some elections are run in a way that makes it difficult to audit whether technology malfunctions or hacks could alter election outcomes. there is still time to address many of these issues before the 2024 elections. for example, having paper ballots does not do any good if you never look at the paper. recounting or auditing paper ballots by looking at pdf files on the screen will not do because a hacked computer can also make up fraudulent images. recounting by writing paper ballots through the optical scanners won'tare hacked to liv, they can lie the second time too. recounting ballots by hand all the time is expensive, slow, and unnecessary if the state has a comprehensive system of random audits that audits a statistically useful sample of ballots. this can be more efficient than a recount. about half the states have a random audit procedure but most are to be to catch error or fraud reliably. three or four states have a risk auditing procedure that
so use technology in a way that it saves times and proves that but demonstrates to the skeptic the technology did not cheat. unfortunately in some elections are run in a way that makes it difficult to audit whether technology malfunctions or hacks could alter election outcomes. there is still time to address many of these issues before the 2024 elections. for example, having paper ballots does not do any good if you never look at the paper. recounting or auditing paper ballots by looking at pdf...
0
0.0
Jan 23, 2023
01/23
by
CSPAN
tv
eye 0
favorite 0
quote 0
new technology. our colleagues at palantir, this is our moment. also for silicon valley tech companies to understand the importance of national security and working with governments to help protect western ideals. for us in particular, our battlefront is the energy security infrastructure. there are two battlefield in our opinion. the war on the front lines and also over christmas 9 million people in ukraine had no access to power. what our company is focused on is how to utilize robotics, autonomous vehicles, as well as ringing that into the fold with software to help project went the environment will fail so we can make the right strategies and plans and things we can recommend because we have the ability to see critical infrastructure across nations and even in the defense sector what leads to failures and how to stop it from failing. these are critical pieces of data that drive artificial intelligence to help predict and provide better decisions as a relates to national security on the energy fro
new technology. our colleagues at palantir, this is our moment. also for silicon valley tech companies to understand the importance of national security and working with governments to help protect western ideals. for us in particular, our battlefront is the energy security infrastructure. there are two battlefield in our opinion. the war on the front lines and also over christmas 9 million people in ukraine had no access to power. what our company is focused on is how to utilize robotics,...
137
137
Jul 6, 2015
07/15
by
CSPAN
tv
eye 137
favorite 0
quote 0
. >> i was going to talk about the drones it -- [laughter] the technology has been great in the last 40 years, and that is one of the. the use of drones is a sophisticated assignation. if you look, if you think about the use of drones in the battlefield or in the battlefield now, it's not a defined place in the battle of the bulge or the battlefields are in a way, all over the place. it raises a amazing moral questions, and we all know what those are in the sense of is it better to take out a handful of people with a drone not only the bad guy but his family as well and people who are happening by at the time, or in drop a bomb and wipe out a whole village. most people would say the former. you have to define the ancillary damage and you do take the human element out of it. hollywood has discovered this in all kinds of movies and stage plays about the kind of on anonymous game playing in some vehicle in the desert in nevada killing somebody you or somebody -- killing somebody or somebodies in afghanistan. after world war ii, or between the world wars, we created these conventions on
. >> i was going to talk about the drones it -- [laughter] the technology has been great in the last 40 years, and that is one of the. the use of drones is a sophisticated assignation. if you look, if you think about the use of drones in the battlefield or in the battlefield now, it's not a defined place in the battle of the bulge or the battlefields are in a way, all over the place. it raises a amazing moral questions, and we all know what those are in the sense of is it better to take...
10
10.0
Aug 5, 2020
08/20
by
CSPAN
tv
eye 10
favorite 0
quote 0
and technologies the u.s. relies on to operate income that -- up combat -- the u.s. relies on to operate in combat. the chinese military feeling very advanced technologies from effect, cyber electronic warfare, to go after the ways the u.s. military operates. they have made a lot more progress than most americans realize. is situation for the u.s. more dire than most americans realize. chillingsense a ourunt of a war in which carriers are having to move east , away from china, should escape attack. our beautiful, f-35 exquisite fighters can't get to their targets to refuel because the refueling plane will get shot down. just a series of really dreadful prospects. he said at one point the talking for senator mccain about this i can onlyago, imagine the conversation and what the choice would be, between surrender and lose or fight and lose. , how did we get into this terrible vision of vulnerability, the kind of scenario you just described were the chinese have a weapons systems dock for an -- weapons systems do
and technologies the u.s. relies on to operate income that -- up combat -- the u.s. relies on to operate in combat. the chinese military feeling very advanced technologies from effect, cyber electronic warfare, to go after the ways the u.s. military operates. they have made a lot more progress than most americans realize. is situation for the u.s. more dire than most americans realize. chillingsense a ourunt of a war in which carriers are having to move east , away from china, should escape...
26
26
Sep 3, 2017
09/17
by
CSPAN
tv
eye 26
favorite 0
quote 0
some of the challenges our technology-based. the big one is power and power consumption. we think about billions of devices out there, a good number of them are not going to be plugged into the grid all the time. they will need battery power of some sort, or the ability to generate their own power. there is some trade-off with their ability to communicate and her energy consumption. that will drive certain considerations in terms of the architecture of iot going forward. potential trade-offs of how you program these devices. they will be out in the wild for 5-10 years. have you keep them updated? there are challenges in the market. and a robber ability -- interoperability is one of the things we see right now. not all devices can talk to each other. proprietary ecosystems you need to take as a consumer before you can take advantage of some of these technological advances. there are issues of trust, consumer trust. there are other challenges. i put two out the most relevant for this room because i think of them as horizontal challenges that are enablers of not of iot and t
some of the challenges our technology-based. the big one is power and power consumption. we think about billions of devices out there, a good number of them are not going to be plugged into the grid all the time. they will need battery power of some sort, or the ability to generate their own power. there is some trade-off with their ability to communicate and her energy consumption. that will drive certain considerations in terms of the architecture of iot going forward. potential trade-offs of...
0
0.0
May 16, 2022
05/22
by
CSPAN
tv
eye 0
favorite 0
quote 0
. >> upgrading technology, in communities big and small, charter is connecting us. >> charter supports c-span as a public service along with these other television providers. giving you a front row seat to democracy. >> the reporting of the new york times, the headline grief and anger sweeps through buffalo after a racist massacre. the day after one of the deadliest racist massacres in american history. a law official -- law officials probe disturbing hands into his behavior and they governor promised action -- the governor promised action on hate speech that they said spent about a -- spread. he was at a top supermarket, killing 10. almost all of the victims were black shoppers and a security guard bound together by tragic happenstance. he picked his target carefully, the police said, choosing an area known for a large black population. resident the area -- visiting the area edit what they police called a reconnaissance. he was picked up by state police after making threatening remarks and had been taken to a hospital for a mental health evaluation. the new york governor on this morni
. >> upgrading technology, in communities big and small, charter is connecting us. >> charter supports c-span as a public service along with these other television providers. giving you a front row seat to democracy. >> the reporting of the new york times, the headline grief and anger sweeps through buffalo after a racist massacre. the day after one of the deadliest racist massacres in american history. a law official -- law officials probe disturbing hands into his behavior...